$1.2M DARPA Contract for FreeBSD Security 90
NAI Labs has been awarded a $1.2 million contract for FreeBSD security development. The main focus for this contract is to develop the TrustedBSD security extentions. The name of the project is CBOSS, (Community Based Open Source Initiative), led by Robert Watson and Lee Badger, and such developers as Kirk McKusick, Poul-Henning Kamp, Jonathan Lemon, and Eivind Eklund will work on it as subcontractors. I am excited over the news; the press release can be found at NAI Labs' CBOSS website.
Re:Bound to piss off MS (Score:1)
Re:Sounds good (Score:1)
>There is nothing wrong with selling your software, but open-source is a great
>way to make best use of public money since the public benefits as well as the
>goverment agency.
I would only agree to that if the license was public domain. The problem with others
(gpl etc..) is that its not really that free. Sure you can get to it, see it,
but not use it however you like. Governments using GPL code would have to release their
application code to be compliant with the license, I don't think so. I think anything
other than public domain is not free. I think government should not fund any endeavor under
any other license than public domain.
Re:FreeBSD monopoly power??? (Score:1)
Anyways, exactly how many FreeBSD base system exploits have you seen in the last few years? Probably 2 or 3. The same is true for OpenBSD, they just keep that ridiculous claim up on their web page because the base system OpenBSD ROOT EXPLOITS happen to have been local exploits, or in features that are turned off by default (read: ftpd). People think OpenBSD is oh-so-secure because of Theo's ability to trim the base system down to nothing (geez, procfs doesn't even come mounted be default), and then his ability to hype. The big exploits come from the software you use to actually do things - web servers, databases, etc - very few modern exploits are the fault of the base system.
So, install OpenBSD on your box and put it on the net, and it will be secure. Until you put the software you need on it, and then it will be "just as insecure" as FreeBSD, which is a very manipulative statement.
GPL Cancer will benefit. (Score:1)
How long before Linus and his Merry Hacks start to suck in the TrustedBSD code and stamp it with their crappy "GPL" license.
Hell, anything that works in Linux is a rip from BSD, even Slashdot's own slashnet servers run on FreeBSD. Linux wasn't up to the task.
Re:I'm in shock (Score:2)
Re:Government contracted open source? (Score:3)
Re: OpenBSD (Score:4)
FreeBSD approaches security
OpenBSD audits their code and tries to remove every single bug before they release, they also improve cryptography preformance and support alot of ccrypto accelerated hardware, as well as basing much of their security on strong cryptography
FreeBSD, on the other hand looks for bugs and tried to eliminate them of course, but it is not it's main focus, and it is not its appraoch to security. What they do is have alot of security
Second off, Robert Watson (the guy who started TrustedBSD) is a core FreeBSD developer, and his chief job as a FreeBSD developer is security. OpenBSD has their ideas that they put into their OS, and this was just one of FreeBSD's idea's, he decided it would be nice to give FreeBSD Trusted OS extentions so he started developing it, he said many times on the TrustedBSD website that he was a FreeBSD developer and this project was a FreeBSD project, he said he is trying to make it as portable as possible and OpenBSD might be able to adopt it if they choose, but they have showed signed that they do not want to go this route with OpenBSD
So basicly the only reason the TrustedBSD might seem like a seperate project is because they are merging it into the FreeBSD kenrel
TrustedBSD never had a chance at being used on OpenBSD since it was started by a FreeBSD core team member who was in charge of FreeBSD security, and because it was a FreeBSD project all along
So FreeBSD will continue to take the security appraoch of fixing as much bugs as is practical to them, they will probably not spend years going through code looking for bugs like OpenBSD but they will add advanced security features
OpenBSD will probably continue along the same development model they are now with security in the Base system
As far as the port system goes you can't expect FreeBSD to secure every port, there are more than 5,500 piece of 3rd party software in the ports! if you think the program in unsecure don't install it
thanks
-Lional Will
Re:Sounds good (Score:3)
Anyway, if you have some Public Domain OS in mind, I'd love to hear about it. The BSD license is just about as close to Public Domain as you can get, with the only major restriction being that you can't simply grab the code and claim you wrote it (under the assumption that the other party has never heard of the code before).
So you have to give credit to the people who wrote the code (and not even in your advertising, just in the code itself). What more do you want?
Down that path lies madness. On the other hand, the road to hell is paved with melting snowballs.
Government contracted open source? (Score:1)
$2000/compile?
Gotta love the government dole!
Just kidding. I think this is a good thing that can only enhance the impact of open source software.
Chas - The one, the only.
THANK GOD!!!
Small correction to the post (Score:1)
Eivind.
Re:The future of root (Score:3)
Re:Why OpenBSD was not chosen (Score:1)
Yes. Definitely a commie. ;-)
Re:Hmmm. Curious choice of base OS (Score:2)
Re:It should be 1.2 million (Score:4)
Not even Fortran programmers?
Re:Sounds good (Score:2)
the government should take advantage of and improve public property whenever possible
That's why they're using a BSD licensed OS and not a GPL licensed OS, BTW
Re:Why OpenBSD was not chosen (Score:2)
"Trusted" is just marketing language and has no official definition. The official definitions, at least for the US government, can be found in the NSA/NCSC rainbow books [fas.org].
TrustedBSD Link broken? (Score:2)
Re:The future of root (Score:3)
--
Re:access control. (Score:1)
> hope that theyroll that code back into
> FreeBSD for all of us civvies to use
I work on the CBOSS project, and that's the plan - we want to integrate the good stuff CBOSS produces directly into FreeBSD for everyone to use.
- Tim Fraser
Re:Government contracted open source? (Score:1)
Hmmm. Curious choice of base OS (Score:2)
--
access control. (Score:2)
I've been watching the various projects looking to develop MAC support for *BSD and I'm glad to see the TrustedBSD project actually going somewhere. I received the announce from them just a few minutes ago, oddly enough- slashdot beat me to seeing it even from them. wow.
Robert Watson knows his stuff, though, so this looks promising. I know I'm looking forward to seeing what they come up with; this seems like a much more sensible development strategy for the DoD, as opposed to funding GPL technologies that leave them hamstrung with distribution and reselling issues. I hope to see more projects like this, and hope that they roll that code back into FreeBSD for all of us civvies to use.
Re:I'm in shock (Score:1)
So what? Everyone knows that no important data is stored on little endian machines!
(man, where did that quote come from anyway, I can't find it with google).
Re:hmm (Score:4)
Re:Bound to piss off MS (Score:1)
(Although the Windows millenium ftp client does carry a 1983 BSD copyright.)
Re:The future of root (Score:4)
The solution under TrustedBSD is to delegate the root responsibilities to various executables. I'm not sure what this solves if root still has access to these new executables. Any ideas on how this will be accomplished?
The main idea is that you'll have a capability (for example) that says "this user can bind to ports numbered lower than 1024" and all executables that require such privileges will be only executable by that user (or some group, or whatever). If you make enough capabilities at a fine-grained level, then you'll be able to limit root's all-knowing, all-seeing power. Obviously this capability isn't a big one, but it's the only one I can quickly recall.
-sugarescent
Re:hmm (Score:2)
Re:SELinux or NSALinux == NAILinux ?? (Score:1)
Re:Huh? Network associates? (Score:1)
Re:The future of root (Score:2)
I should read more carefully
Re:The future of root (Score:3)
The idea behind the partitioning setup is that each exploit only grants access to a *part* of the system -- specifically the parts that the particular rootlet has access to. Using chroot for servers even partitions the file system limiting visibility to data.
IMHO the idea is a good one. It doesn't even make systems more difficult to setup/administer, if well done.
Re:Bound to piss off MS (Score:1)
--jb
Re:I'm in shock (Score:2)
Hello?
You have "signed an NDA with the BSD dev team"?
How can you sign an NDA with a "core" (note: "core", not "dev") team, for an OS which is open source? That does not make any sense.
What on earth are you talking about? BSD/OS? FreeBSD? Open/NetBSD?
Finally, if there was such a thing as "a longjump right into the kernel" with "full root privileges", this thing would be all over Bugtraq right now... This is BSD, after all. Not some closed-source OS.
I think you may have a little bit of explaining to do...
The FreeBSD OS of Science (Score:2)
Re:Open BSD (Score:1)
And yes, like most things....I did read it somewhere. The world is what has been presented to you, and that was as far as I had taken my own personal search for secure BSD distributions.
I probably won't get a reply...so while i'm waiting on nothing i'll begin researching that string of acronyms you presented to me. Thanks for at least giving me a place to start.
openBSD (Score:1)
Think of it this way, The US goverment might pay Microsoft, Novel, Sun, and IBM (amongst others) some huge contracts for way more than a measly 1.2 Million Dollars (US).
I can recall an artical on
The researchers noted in their press releasse that if they had used Compaqs Tru64 Unix, it would have cost them several million dollarts, where the hardware for that project was just under a measly 200K.
To me, this singnifies a shift in goverment policy. -J
Umm... CBOSS || CBOSI? (Score:2)
Based
Open
Source
Initiative (Where is the stupid 'S'???)
Spelling almost as good as
Securelevels (Score:2)
Re:Sounds good (Score:1)
Insecure ports (Score:2)
Does anyone know much about all of this? From what I have read before, you can limit access of an application using control lists, but since I have never worked on a system with this feature I have no idea what it can do.
Good read...
http://www.securityportal.com/closet/closet2001
Anybody have an opinion on whether corporations would find FreeBSD to be more viable after these features are in the system?
I believe that if Microsoft actually follows through with porting
Linux is also a good OS, but when you have companies like Corel and others packaging any half-baked software projects into the distribution you end up with a dis-jointed environment. The opposite is true for MacOS X. Apple took some Open Source (FreeBSD, OpenSSH, etc) and packaged it with code that they wrote (Aqua, Quartz, NetInfo) to create a complete system.
The fact that Apple should be able to incorporate most of the changes to FreeBSD into Darwin/MacOS X is good news. Apple should add some money to the pot to help take it a little further, perhaps add more more developers and reduce the time it takes to complete some key features.
Uh. Why are they security "extensions" again? (Score:1)
Ah. I see. TrustedBSD claims to have its fingers into too many pieces of code to justify integrating into core FreeBSD. Does no one use CVS branching and merging? Lame!
Re:Uh. Why are they security "extensions" again? (Score:1)
As you observe, some TrustedBSD features have already been integrated into the base tree, including extended attributes on files, as well as infrastructure support for capabilities, ACLs, and some of the improved abstractions I spoke about above. The plan is to integrate most of the TrustedBSD features into the base operating system distribution over time; some features are more intrusive, as well as more computationally expensive, than others, meaning that some features may be distributed as modules rather than enabled by default. However, it is a definite goal to make all of the work easily available for FreeBSD installations, and under a two clause BSD-style license. Many of these features will appear in FreeBSD 5.0-RELEASE, although they will presumably mature over time.
slashdot much?
ben
Re:Uh. Why are they security "extensions" again? (Score:1)
http://slashdot.org/interviews/01/01/18/1251257
Re:*BSD is dying. (Score:1)
F-bacher
Re:Umm... CBOSS || CBOSI? (Score:1)
F-bacher
It should be 1.2 million (Score:2)
F-bacher
Re:hmm (Score:1)
1.2 Million...
Open Source? (Score:1)
sweet (Score:1)
Net BSD will be able to take some of these
improvements too. I run a webserver on an
OpenBSD box, and with their model of "Secure by
default" combined with the ability to finally
not run apache as a root, this makes me real
happy. Why? Because I'm not the best PHP
developer out there, and have been responsible
for more than my fair share of holes in an
otherwise secure box for too long.
Browsing Slashdot... the fun way (Score:2)
what about export? (Score:1)
Is NA going to own the patent of the softwares (whatever that is)? Then again, what is the point?
hmm (Score:1)
This troll is deceased (Score:2)
Mr. Praline : 'Ello, Miss?
Owner : (turning around, very angry) What do you mean, "miss"?
Mr. Praline : I'm sorry, I have a cold.
Mr. Praline : I wish to make a complaint!
Owner : (hurriedly) Sorry, we're closin' for lunch...!
Mr. Praline : Never mind that, my lad. I wish to complain about this troll, what I purchased not half an hour ago from this very boutique.
Owner : Oh yes, the, ah, the BSD is dead... What's, ah... W-what's wrong with it?
Mr. Praline : I'll tell you what's wrong with it, my lad. It's dead, that's what's wrong with it.
Owner : No, no, 'e's ah... he's resting.
Mr. Praline : Look, matey, I know a dead troll when I see one, and I'm looking at one right now.
Owner : No no, h-he's not dead, he's, he's restin'!
Mr. Praline : Restin'?
Owner : Y-yeah, restin.' Remarkable troll, the BSD is dead, isn't it, eh? Beautiful plumage!
Mr. Praline : The plumage don't enter into it. It's stone dead!
Owner : Nononono, no, no! 'E's resting!
Mr. Praline : All right then, if he's resting, I'll wake him up!
(shouting at the cage)
'Ello, Polly! Mister Troll! I've got a lovely fresh cuttle fish for you if you wake up, Mr. Troll...
(owner hits the cage)
Owner : There, he moved!
Mr. Praline : No, he didn't, that was you pushing the cage!
Owner : I never!!
Mr. Praline : Yes, you did!
Owner : I never, never....
(He pulls the troll out of the cage and screams into its ear.)
Mr. Praline : 'ELLO POLLAAAAAAAY! POLL-EE! POLLY TROLL! WAKE UP!
(He bangs its head against the store counter, horribly hard.)
TESTIIIING! TESTIIIING! THIS IS YOUR NINE-O' CLOCK ALARM CALL!
(He does it again, harder.)
POLL-EEEEEEE!
(He tosses it up in the air and watches it plummet to the floor. Longish pause.)
Now that's what I call a dead troll.
Owner : No, no.... No, he's stunned.
Mr. Praline : STUNNED?
Owner : Yeah! You stunned him, just as he was wakin' up! BSD is deads stun easily, major.
Mr. Praline : Look my lad, I've had just about enough of this. That troll is definitely deceased, and when I bought it not half an hour ago, you assured me that its total lack of movement was due to it being tired and shagged out after a long squawk.
Owner : Well, he's... he's, ah... probably pining for the fjords.
(Praline looks angrily back and forth, stuttering.)
Mr. Praline : PININ' for the FJORDS? What kind of talk is that? Look, why did he fall flat on his back the moment I got 'im home?
Owner : The BSD is dead prefers kippin' on its back! Remarkable troll, isn't it, guv, eh? Lovely plumage!
Mr. Praline : (coldly) Look, I took the liberty of examining that troll when I got it home, and I discovered the only reason that it had been sitting on its perch in the first place was that it had been NAILED there.
(pause)
Owner : Well, of course it was nailed there! If I hadn't nailed that troll down, it would have nuzzled up to those bars, bent 'em apart with its little pecker, and VOOM!
Mr. Praline : "VOOM?"
(Praline puts the cage down and take the troll into his hands.)
Mr. Praline : Look matey, this troll wouldn't "voom" if you put four thousand volts through it! It's bleedin' demised!
Owner : It's not! I-It's pining!
Mr. Praline : It's not pinin,' it's passed on! This parrot is no more! It has ceased to be! It's expired and gone to meet its maker! This is a late troll! It's a stiff! Bereft of life, it rests in peace! If you hadn't nailed him to the perch he would be pushing up the daisies! Its metabolical processes are of interest only to historians! It's hopped the twig! It's shuffled off this mortal coil! It's run down the curtain and joined the choir invisible! This.... is an EX-TROLL!
(pause)
Owner : Well, I'd better replace it, then.
(He disappears behind the counter.)
Mr. Praline : (turning to camera) If you want to get anything done in this country you've got to complain 'til you're blue in the mouth.
(The owner returns.)
Owner : Sorry guv, we're fresh out of trolls.
Mr. Praline : I see. I see, I get the picture.
Owner : (quietly) I-I've got a slug.
(pause)
Mr. Praline : (sweet as sugar) Does it talk?
Owner : Not really, no.
Mr. Praline : Well, it's SCARCELY A BLOODY REPLACEMENT then, IS IT?
Owner : Listen, I'll tell you what, tell you what, if you go to my brother's pet shop in Bolton, he'll replace your troll for you.
Mr. Praline : Bolton, eh?
Owner : Yeah.
Mr. Praline : All right.
(He leaves.)
Re:The future of root (Score:2)
If you then run a daemon as root, and someone finds an exploit in it allowing them to trick it to modify
Even if the hacker finds a root exploit in the daemon, and thus has a root shell, he can't modify
Re:It OUGHT to be in the public domain. (Score:1)
Did you ever notice that the BSD license, assuming you using the 2 clause one, grants all the freedoms of public domain software except that you have to include copyright notice. I think all government work should be released under BSD like licenses becase it allows all to benifit from it, just requiring them to give credit.
Re:Sounds good (Score:1)
It seems to me (correct me if I'm wrong) that the US has a higher than average concentration of IP related to computer software. Releasing new code under BSD, GPL, whatever "free"/"open" license they decide to use would dilute that concentration (by making more available to the less concentrated economies), possibly making the US economy not as stable. This may be one reason why politicians are reluctant to support open source software development with public money.
Re: OpenBSD (Score:2)
Blockqoth the AC, AKA Lional Will:
Ahem. OpenBSD has runlevels [openbsd.org].
It's also best to remember that security is not a feature set, but rather a process and a frame of mind. OpenBSD is designed to give you a platform which gives you a good start for your security process. An OpenBSD system can be made very insecure, and most any other operating system can be made very secure. One of OpenBSD's goals, however, is to make security a bit easier.
Besides, should TrustedBSD turn out to be something worthwhile--and it's rather likely it will--there's an excellent chance it'll find its way into the other BSDs. There's a heck of a lot of cross-polination that goes on in the BSD world.
FreeBSD is very well suited to this kind of research. The other BSDs will benefit, just as all have benefited from OpenSSH, NetBSD's ports....
b&
Re:Sounds good (Score:2)
Re:Sounds good (Score:3)
The problem with a BSD-ish license is that it allows a private corporation to take advantage of a public resource without any compensation to the public. The libertarians (especially those tools that think corporations deserve the same rights as people) will argue that the corporation has theoretically paid taxes and therefore has as much right to the public resource as it needs. But when/if a corporation takes that public good and uses it to further their private development (and does not pass along the public resource in the same form they received it), then they have been given a freebie at the expense of society.
If we are going to give away public resources, we should be aware of it. And personally I'm against it. The GPL makes certain that a public resource remains a public resource, to which all users have the same right of access.
TrustedBSD vs SELinux (Score:1)
Re:Can I get an interpretation, please? (Score:1)
Sounds good (Score:5)
I've got no problem with Microsoft selling to Coke or Ford or whomever, but I think the government should take advantage of and improve public property whenever possible. This is the IP equivelent of public parks that everyone can enjoy and share. Instead of using our taxes to further the causes of private companies, we can use our taxes to improve software for everyone.
Re:Sounds good (Score:1)
Re:Sounds good (Score:2)
Re:*BSD is dying. (Score:1)
Well, maybe if it's just a Tribes2 server I guess, but STILL... roflmao.
Re:I'm in shock (Score:1)
Why OpenBSD was not chosen (Score:2)
For everyone who thinks that they should have used OpenBSD, let me give you a heads up. Whenever you see the work "Trusted" in front of an OS name, it means that that version has been officially certified secure both in design and code audits. Trusted is the highest level of security available and is the only type of OS used for high security work. (Think FBI and CIA) Another example besides TrustedBSD [trustedbsd.com] is Trusted Solaris [sun.com].
As for FreeBSD being the base for TrustedBSD, my understanding is that TrustedBSD was started by a branch of the FreeBSD team as thus used FreeBSD. Ok, enough shameless karma horing for today.
Re:Sounds good (Score:1)
Re:Sounds good (Score:1)
Heh (Score:1)
---------------
Re:FreeBSD monopoly power??? (Score:1)
---------------
Can I get an interpretation, please? (Score:2)
That sounds a lot like "we're going to work on the easy problems and start writing proposals for more grants."
I've worked on some DARPA grants. "Researchers" seem to expend at least as much effort catering to their project managers and trying to line up their next grant as they do actually taking on the project.
1.2M / 7people / 1.5 years = ~114K per person per year.
It looks like they paid paid their salaries (congrats). I hope they spend more time working on security problems than trying to figure out where the next big DOD grant is.
Huh? Network associates? (Score:1)
Why is it everytime I boot my machine the 'virus shield' program is asking to locate the DNS server? This program has no reason to get online.
Of course I could look at the source, but then they'd find me and throw me in jail for 0wning them.
Oh, and the network associates whose ftp site is out in the open for any kid that wants full registered flagship software? It's been like that for hmmm... 3 or 4 years now. I'm not going to check though : )
Re:*BSD is dying (Score:1)
Maybe if it hit Wal-Mart it'll bounce back.
Re:The future of root (Score:1)
Re:Bound to piss off MS (Score:1)
Re:Huh? Network associates? (Score:1)
Ph00l.
Re:Important to Community... (Score:1)
Re:Important to Community... (Score:1)
Important to Community... (Score:4)
Re:Sounds good (Score:1)
...but because it's released under the BSD license, not the GPL, it also allows corporations to add a few proprietary features and resell it. Be the corporation NAI or Microsoft.
This is the IP equivelent of public parks that everyone can enjoy and share.
I would argue that the GPL would be a park that everyone can enjoy and share, and that the BSD license would be a park that everyone could share except you had to pay a company to access the nicer parts.
Honestly, this is why Microsoft has been attacking the GPL. They have not been attacking "Open Source", they are attacking government funded GPL'd projects. When the government funds a BSD licensed project, it's no threat to Microsoft, and they can resell the Windows version next year.
Not that this is a bad thing. But it's food for thought.
Re:The future of root (Score:1)
In the TE - a principle (generally a unix process but occasionally a packet or device) has it's identity checked against the type of the object it is accessing. One of the privleges is the ability to change the identity and there is a state table of allowed changes - so as mentioned earlier, one key element is that most privlege changes are one way (typically from more to less). Each subsystem had it's own set of types so there was a virtual sandbox for each piece. Psuedo-objects were referenced for things like port numbers - so that a MAC could say things like telnetd can only listen on TCP port 23, but can't connect() at all or listen on other ports.
We went a step further an implemented totally seperate protocol stacks for inside versus outside so that we could give different privleges to an inside telnetd (such as allowing elevation to administrative privlege) verus and outside one.
The only form of privlege elevation was a trusted login - which had to be at the console. Even this login didn't acquire full privlege - there was a special diagnostic kernel that had full privlege (but no external networking) that could be used.
Key points we discovered over the years. One - lack of real root makes you make your software much more robust. If you have to bring down the box to get at certain privleged files you better be pretty stable. The second was how sloppy Unix software is at needing (or at least letting itself be able) to write willy nilly around the world. Without a doubt the hardest part was getting all of the userland subsystems like mail, web, login, logging, etc. to function within their mandatory little sandboxes. It was amazing how much software was sloppy - opening files that need to be read-only as writable, etc. Granted this was 7-8 years ago and things have definitely gotten better - but it still was scary.
The curious can look at U.S. patents 5,864,683 and 6,219,707. There is the usual crap in there but wade past the claims and read the description and there is good discussion as to the nature of MAC and TE and the types of attacks they help protect against.
On the plus side Unix is relatively easy to secure in this fashion. File access and network is relatively well isolated. Biggest risk is "aliasing" - different vectors that might bypass the in-kernel access checks such as mmap()ing files, inherting file handles, etc.
In general having this functionality available in open software cant help but be a good thing.
--
Mark
SELinux or NSALinux == NAILinux ?? (Score:1)
Perhaps this distro is not as 'corrupt' or biased as initially thought.
BSD developers (Score:3)
What a multi-talented guy.
Re:Why OpenBSD was not chosen (Score:1)
The future of root (Score:5)
Re:hmm (Score:3)
OpenBSD positions itself as a "Canadian" operating system to get around U.S. gov't regulations and the U.S. gov't doesn't like giving anything to Canada (except acid rain and fugitive criminals.)
They offered but Theo had one of his Turette-esque attacks during the negotiations and things went downhill from there.
Easier to convince Kirk to license the BSD daemon for the new $1 bill.
Re:hmm (Score:1)
This is very exciting (Score:1)
Re:hmm (Score:1)